Search This Blog

Friday, August 03, 2012

Cisco stays the network virtualization course

NASA Mars Curiosity mission madness | Heated debate over stalled cybersecurity bill pits pro-defense Democrats vs. hands-off Republicans

Network World Daily News AM

Forward this to a Friend >>>


Cisco stays the network virtualization course
Cisco this week responded to all the scuttlebutt in the industry around big data center vendors buying network virtualization companies, and the impact it will have on Cisco in terms of competition and partnerships. Read More


WHITE PAPER: Riverbed

The Key to Effective Private Clouds
A crucial element to any private cloud is the ability to provide reliable application performance and data transfer over the WAN. What's more, additional bandwidth won't' solve performance problems caused by latency. See how key features in WAN optimization can make the difference between a private cloud success or failure. Learn More

WHITE PAPER: Silver Peak Systems, Inc.

Avoid Common Packet Delivery Issues across the WAN
Packet loss is increasingly problematic for companies looking to lower DR costs by performing data replication over the WAN. This paper discusses the inaccuracies of measuring packet loss with ICMP (i.e. ping method) and explains how to mitigate this risk with proper packet loss measuring tools. Learn more.

NASA Mars Curiosity mission madness
A quick look at the NASA Mars Science Laboratory and Curiosity rover mission Read More

Heated debate over stalled cybersecurity bill pits pro-defense Democrats vs. hands-off Republicans
The cybersecurity bill that went down Thursday to legislative defeat shows the deep schism in Congress that had Democrats siding with traditional national-security defense hawks, and Senate Republicans, who toppled the bill, largely siding with businesses that didn't want government foisting new regulations on them. Read More

The NSA's acceptance of hackers at Defcon marks progress for information security
At last year's GFIRST summit in Nashville, I participated in a panel discussion on the role of threats to federal information systems. All of us on the panel held differing views regarding individual types of threats; sometimes the audience gave our responses a polite round of applause, and other times, mild groans and the occasional hiss were heard when a panelist said something particularly controversial.... Read More


WHITE PAPER: Silver Peak Systems, Inc.

Send Less Data across the WAN
Because WAN deduplication works on all IP traffic, it plays a key role in a variety of IT initiatives including server consolidation, virtualization, and application delivery. Learn how this proven technology can dramatically improve the performance, reliability, and efficiency of data backup and recovery. Learn more.

Nokia preps to sell Qt, but not before Elop screws it up
Word from Australia is that Nokia is shutting down the Brisbane office that has worked on the open-source graphical interface framework Qt in preparation to sell off the framework. Read More

Microsoft Codenames: A Visual History
In its 37 years, Microsoft has not only created technologies that have shaped our world, it has also offered up some of the most memorable codenames in the tech business. Read More

Social discovery smartphone apps gaining popularity
Technology workers of Silicon Valley are embracing social apps to find like-minded people nearby and to let VC's know if they are in the neighborhood. IDG tested some apps to see which ones got the quickest response time. Read More


WHITE PAPER: Bradford Networks

BYOD Deluge
This white paper will explore network access control (NAC) and mobile device management (MDM) and how together they can enable IT departments to effectively oversee devices and the network in this new era of IT consumerization. Learn more.

INSIDER
Webroot's big cloud gamble
Anti-malware vendor Webroot has bet the company on cloud. Read More

Hospital networks take key role in health care as IT makes further clincial advances
The health care industry's increased use of electronic medical records (EMRs), wireless medical devices and personal mobile technology has turned hospital networks into important components in patient treatment. Practicing medicine now requires maintaining constant wireless connectivity and possibly managing wired network traffic if doctors and nurses are to fully leverage health IT according to health care professionals. Read More

AirTight: From WIPS to EWLS
Airtight Networks has been one of the leading suppliers of wireless intrusion protection systems (WIPS) since their founding, and is best known for their SpectraGuard Enterprise security system. SpectraGuard Enterprise consists of a server with a Web-based console and "scanners" that act as sensors. As it turns out, the difference between a scanner and an access point (AP) is fairly minimal; indeed,... Read More



SLIDESHOWS

12 new network features in Windows 8
There are a bunch of new and impressive administrative features designed to increase network support, reliability, performance, and security.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 'Anonymous' turns in hacker who targeted children's charity
  2. Apple initially wanted an iPhone with shaped glass, deposition reveals
  3. Verizon Wireless to pay fine for allegedly blocking tethering apps
  4. Outlook.com review: Microsoft turns mail into mini-Facebook
  5. Google cloud vs. Amazon cloud: How they stack up
  6. Microsoft kissing Hotmail goodbye
  7. Microsoft code contains the phrase 'big boobs'
  8. 12 new network features in Windows 8
  9. New data center design boasts 'world's most efficient cooling system'
  10. Rackspace, HP go all in with OpenStack

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment:

Security Course said...

Nice! I really enjoyed reading your post. Thanks for sharing and keep up the good work.